フォロー
Curtis Hash
Curtis Hash
LANL / EY
確認したメール アドレス: lanl.gov - ホームページ
タイトル
引用先
引用先
Scan statistics for the online detection of locally anomalous subgraphs
J Neil, C Hash, A Brugh, M Fisk, CB Storlie
Technometrics 55 (4), 403-414, 2013
1572013
Unified host and network data set
MJM Turcotte, AD Kent, C Hash
Data science for cyber-security, 1-22, 2019
1502019
Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness
JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent
US Patent 9,560,065, 2017
502017
Stochastic identification of malware with dynamic traces
C Storlie, B Anderson, SV Wiel, D Quist, C Hash, N Brown
The Annals of Applied Statistics, 1-18, 2014
282014
Path scanning for the detection of anomalous subgraphs and use of dns requests and host agents for anomaly/change detection and network situational awareness
JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent
US Patent App. 16/278,225, 2019
202019
Towards improved detection of attackers in computer networks: New edges, fast updating, and host agents
J Neil, B Uphoff, C Hash, C Storlie
2013 6th International Symposium on Resilient Control Systems (ISRCS), 218-224, 2013
182013
Malware phylogenetics based on the multiview graphical lasso
B Anderson, T Lane, C Hash
Advances in Intelligent Data Analysis XIII: 13th International Symposium …, 2014
172014
Term distribution visualizations with focus+ context
M Schwartz, C Hash, LM Liebrock
Proceedings of the 2009 ACM symposium on Applied Computing, 1792-1799, 2009
14*2009
Joint Statistical Meetings
J Neil, C Storlie, C Hash, A Brugh, M Fisk
Vancouver, Canada (Aug. 4, 2010), 2010
112010
Advanced Computing Solutions, Statistical Sciences Group (CCS-6), Los Alamos National Laboratory
J Neil, C Storlie, C Hash, A Brugh, M Fisk
10
Statistical detection of intruders within computer networks using scan statistics
J Neil, C Storlie, C Hash, A Brugh
Data Analysis for Network Cyber-Security, 71-104, 2014
82014
Non-harmful insertion of data mimicking computer network attacks
JC Neil, A Kent, CL Hash
US Patent 9,374,380, 2016
72016
Unified Host and Network Data Set.” arXiv e-prints
MJ Turcotte, AD Kent, C Hash
August, 2017
62017
FileMap map-reduce program execution on loosely-coupled distributed systems
ME Fisk, CL Hash Jr
Proceedings of the Fourth International Workshop on Cloud Data and Platforms …, 2014
42014
Consideration of issues for parallel digital forensics of raid systems
V Urias, C Hash, LM Liebrock
Journal of Digital Forensic Practice 2 (4), 196-208, 2009
42009
Non-harmful insertion of data mimicking computer network attacks
J Neil, A Kent, JR Curtis Hash, M Fisk, A Brugh, C Storlie, B Uphoff
US Patent 10,122,741, 2018
32018
Stochastic Identification and Clustering of Malware with Dynamic Traces
CB Storlie, S Vander Wiel, D Quist, B Anderson, C Hash, N Brown
Malware Technical Exchange Meeting 2012, 2012
32012
Term distribution visualizations with a focus+ context model
M Schwartz, C Hash, L Liebrock
Technical report, New Mexico Institute of Mining and Technology, 2008
12008
Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness
JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent
US Patent 10,243,984, 2019
2019
Authscan 2. x
M Turcotte, N Heard, C Hash, A Brugh
Los Alamos National Laboratory (LANL), Los Alamos, NM (United States), 2018
2018
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20